Revisiting 1-copy equivalence in clustered databases
Proceedings of the 2006 ACM symposium on Applied computing
AKARA: A Flexible Clustering Protocol for Demanding Transactional Workloads
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part I on On the Move to Meaningful Internet Systems:
Database replication: a tale of research across communities
Proceedings of the VLDB Endowment
On the expressiveness and trade-offs of large scale tuple stores
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
A correlation-aware data placement strategy for key-value stores
Proceedings of the 11th IFIP WG 6.1 international conference on Distributed applications and interoperable systems
Group-Based replication of on-line transaction processing servers
LADC'05 Proceedings of the Second Latin-American conference on Dependable Computing
Practical database replication
Replication
DRO+: a systemic and economical approach to improve availability of massive database systems
WISE'06 Proceedings of the 7th international conference on Web Information Systems
Hi-index | 0.00 |
Database replication based on group communication systems has recently been proposed as an efficient and resilient solution for large-scale data management. However, its evaluation has been conducted either on simplistic simulation models, which fail to assess concrete implementations, or on complete system implementations which are costly to test with realistic large-scale scenarios. This paper presents a tool that combines implementations of replication and communication protocols under study with simulated network, database engine, andtraffic generator models. Replication components can therefore be subjected to realistic large scale loads in a variety of scenarios, including fault-injection, while at the same time providing global observation and control. The paper shows first how the model is configured and validated to closely reproduce the behavior of a real system, and then how it is applied, allowing us to derive interesting conclusions both on replication and communication protocols and on their implementations.